libvbr2-2.11.0-bp154.3.3.1 4>$  Ape-!M@eeeBzIt$ĉ>g7DaK3IRjrp(:Љ\Sgh+huHJKS˜+N1Il N[ݤЋdz3X\wfKܦ!\A9oshPn={`*DLJYaYpyrQY48u DKqU(͹(ٖ"n6+J$b|z #oܹïiTm#Ex*68cb9571167e15b484dca3129d836b6a531c2432a990388d39c32e2dfe04423b4fa992999f5efeab9a012a2db31987e9cd025becE؉e-!M@eeek Jp`H-'[r5]SIOl!B|tA%0³l05fK0cܹDs`Q4Q VAʭhOvA  Ht+8k sg [ )-A1@oFk^wY\ITZ ㏀HQVMmC@'wVA?ad]  JOEevmFbcҁ-iqDmy9\]W*7%tQr{"t>#`[P>p@'?'d   Q *CIPX \ ` h  4 d  (89:>$U@$dF$sG$H$I$X$Y$\$]$^$b%c%d&Ne&Sf&Vl&Xu&lv&tw'x'y'z'4'D'H'N'Clibvbr22.11.0bp154.3.3.1Library for assisting in Vouch By Refence functionsThis package provides the shared library libvbr which assists in Vouch By Refence functions.e-~i04-ch4aYSUSE Linux Enterprise 15openSUSEBSD-3-Clause AND Sendmailhttp://bugs.opensuse.orgSystem/Librarieshttp://www.opendkim.org/linuxx86_64Ye-}e-}0e56f1a70aeeceabd46fb56df3dd1e1f9dad8f648fe20cbc0a5ee97c21d0e2aclibvbr.so.2.0.0rootrootrootrootopendkim-2.11.0-bp154.3.3.1.src.rpmlibvbr.so.2()(64bit)libvbr2libvbr2(x86-64)@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libresolv.so.2()(64bit)libresolv.so.2(GLIBC_2.2.5)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3e)1@amaah`E_=@__ L[[5@[5@[ @Y.XVwV&@U>$U>$T{T|X@Ferdinand Thiessen Johannes Segitz Togan Muftuoglu Christian Wittmer Dominique Leuenberger Thorsten Kukuk Thorsten Kukuk mrueckert@suse.demrueckert@suse.dekbabioch@suse.comopensuse@dstoecker.dejengelh@inai.derpm@fthiessen.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.de- Add fix-RSA_sign-call.patch * Fix bsc#1216117 * Fix call of RSA sign on big endian systems, patch origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506- Added hardening to systemd service (bsc#1181400). Added patch: * harden_opendkim.service.patch Modified: * opendkim.service- Add cve-2020-12272.patch (CVE-2020-12272) * Confirm that the value of "d=" is properly formed, fixed upstream in commit 14d54524e0a97d3fe9b80441907d7e356c9ded04 - Add unbound-fix.patch * Plug memory leak in Unbound callback https://github.com/trusteddomainproject/OpenDKIM/pull/57- add opendkim to Group unbound to be able to read TrustAnchorFile - add postfix to Group opendkim to be able to read/write to opendkim.sock - add %{_sysconfdir}/%{name}/keys dir - change /var/run to /run wherever used - rework opendkim-2.9.2_default_config.patch and renamed it to opendkim-default_config.patch- Fix usage of %{_libexecdir} when %{_tmpfilesdir} was meant to be used.- opendkim calls openssl, make sure the command is there- Use systemd_ordering instead of systemd_requires for container - Update to opendkim 2.11.0-Beta2 - Add support for ED25519 keys - Add compatibility with openssl-1.1.0 - Feature request #190: Reject signature object requests where the domain name or selector includes non-printable characters. - Feature requrest #187: Add option to match subdomains when generating zone files. - Many bug fixes - Obsoletes opendkim.ticket35+37.patch - Disable erlang, new erlang version seems to miss required files- https://src.fedoraproject.org/rpms/opendkim/raw/master/f/opendkim.ticket35+37.patch allow building on newer distros (openssl 1.1 support)- fix the previous change: source files got added but the renumbering was not applied to the reference to the source files -> signature file was installed as services file- Applied spec-cleaner to spec file - Removed conditionals around %license macro - Used OpenPGP signature provided upstream - Added opendkim.keyring containing the key used to sign official releases.- enable DNSSEC support (requires unbound library) ATTENTION: The file /var/lib/unbound/root.key must be readable by user opendkim, which is not the fact for older unbound packages- Remove some idempotent %if blocks.- Implemented shared-library-packaging-policy * Splitted shared libraries - Some spec file cleanup - Splitted autobuild and miltertest programs into own subpackages- require main package from devel package - fix conditional for sql support. it was mixed with sql and opendkim_sql - make RRD support optional pulls a lot of things. - use correct license for the sendmail part- update to 2.10.3 - LIBOPENDKIM: Make strict header checking non-destructive. The last change to this code resulted in failing signatures. Reported by Pedro Morales and Wez Furlong. - changes from 2.10.2 - Fix bug #221: Report a DKIM result of "policy" if MinimumKeyBits or UnprotectedKey cause the signature to result in a "pass" override. Reported by Kurt Roeckx. - Fix bug #227: Revert removal of SenderHeaders configuration setting. Document that it is now limited to signature selection. - LIBOPENDKIM: Fix bug #226: Deal with header fields that are wrapped before there's any content. Reported by Alessandro Vesely. - CONTRIB: Update to contrib/systemd/opendkim.service.in from Steve Jenkins. - refreshed opendkim-2.9.2_default_config.patch to apply cleanly again- cleanup build requires- update to 2.10.1 Make DB_SIGNINGTABLE symbol available in Lua scripts. Problem noted by Klaus Heinrich. Fix bug #214: Handle arbitrarily large From: fields. Reported by Tomohiko Sasaki. LIBOPENDKIM: Fix bug #213: Remove "dkim_default_senderhdrs" from dkim.h. Problem noted by Daniel J. Luke. LIBOPENDKIM: Fix bug #219: Unresolved CNAMEs are not failures, according to the DNS (see RFC6604), so report them as NXDOMAIN or similar. Reported by Alessandro Vesely. - changes from 2.10.0 Feature request #182: Remove "AddAllSignatureResults". All signature results will now be added via Authentication-Results header fields. Requested by Tomki Camp. Feature request #180: Rename "LDAPSoftStart" to "SoftStart" and apply it to SQL connections as well. Requested by Daniel Kauffman. Feature request #179: Add "IgnoreMalformedMail" option. Fix bug #183: Discontinue support for ADSP. This removes the following configuration file items: AddAllSignatureResults LocalADSP ADSPAction NoDiscardableMailTo ADSPNoSuchDomain On-PolicyError BogusPolicy SendADSPReports DisableADSP SenderHeaders LDAPSoftStart UnprotectedPolicy Make "rrvs" and "smime" recognized Authentication-Results methods. LIBOPENDKIM: Feature request #157: Add dkim_mail_parse_multi(). Suggested by Alessandro Vesely. LIBOPENDKIM: Feature request #185: Add dkim_set_dnssec(). Patch from Alec Peterson. LIBOPENDKIM: Fix bug #183: Discontinue support for ADSP. This means all of the following: - the dkim_policy_t type has been removed - the DKIM_POLICY_* constants have been removed - the DKIM_PRESULT_* constants have been removed - passing DKIM_OPTS_SENDERHDRS to dkim_options() now results in an error - the DKIM_PSTATE structure has been removed - all of the following functions have been removed: dkim_policy(), dkim_policy_dnssec(), dkim_policy_getqueries(), dkim_policy_getreportinfo(), dkim_policy_state_free(), dkim_policy_state_new(), dkim_policy_syntax(), dkim_getpolicystr(), dkim_getpresult(), dkim_getpresultstr(), dkim_set_policy_lookup(), dkim_test_adsp() LIBOPENDKIM: DKIM_LIBFLAGS_STRICTHDRS now also confirms syntactical validity of the From field before proceeding with a signing or verifying operation. Suggested by Wez Furlong. CONTRIB: Fix bug #207: Clean up the "stats" directory. CONTRIB: Add "repute" directory which could eventually replace the PHP implementation. Submitted by Daniel Black. CONTRIB: Patches to systemd and init/redhat from Steve Jenkins. - changes from 2.9.3 Fix bug #177: Plug leaking "result" structures when OpenLDAP is in use. Truncate configuration file lines at carriage return. Replace overlapping strlcpy() with memmove() in dkim_get_key_file(). Reported by Daniel J. Luke. Patch #32: Re-arrange the execution logic to drop privileges in proper order. LIBOPENDKIM: dkim_header() is now a lot more strict about the input it will accept (see RFC5322 Section 2.2). LIBOPENDKIM: Tighten relaxed modes to break on only DKIM-defined whitespace characters. Problem noted by Elizabeth Zwicky. LIBOPENDKIM: Fix bug #208: If a signature fails to verify for either reason (header hash mismatched or body hash mismatched), set DKIM_SIGERROR_BADSIG so that Authentication-Results doesn't report a failure with "no signature error". TOOLS: Feature request #178: Add "-F" flag to opendkim-genzone so records are created with the FQDN. Patch from Andreas Schulze. REPUTATION: Handle parameters safely in repute.php. Reported by Daniel Black. - refreshed patches to apply cleanly again: opendkim-2.9.2_compiler_warnings.patch opendkim-2.9.2_default_config.patch - use the correct signal for reloading the config - make sure that all the buildrequires we added are actually used by adding the needed --with-* options- more work on integration with the distribution - added init system support (systemd,sysvinit) - adapt the default config to change some defaults new patch: opendkim-2.9.2_default_config.patch - a few more buildrequires: libevent-devel, tre-devel, unbound-devel, erlang- initial package/sbin/ldconfig/sbin/ldconfigi04-ch4a 16974493422.11.0-bp154.3.3.12.11.0-bp154.3.3.1libvbr.so.2libvbr.so.2.0.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protectionobs://build.opensuse.org/openSUSE:Maintenance:18120/openSUSE_Backports_SLE-15-SP4_Update/49d8527c7d2f80af89294fbc5533b921-opendkim.openSUSE_Backports_SLE-15-SP4_Updatecpioxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=42d4b45c9c98f5bf22eff079290eb7a42e80cbda, not strippedPRRRRRR4. Iutf-8a9dbaf1edc1b9a2b6d7eecbb086f202fe1b772ab1f2a52b11ec7abe5baafa29d?7zXZ !t/[O] cr$x#I|S5kqV'Oc~fXZqߓ cHoM Bw4eSML9 VoX-ёP(0\;AcC:Г4ې^2_ :FG~ef,tGd kXV>942:AS{% x~&#)RѰϭd!R:čYy! ʄs67+2IҖ!`%f ybP'M2>};s;װ5 Yg*7bfH)re;W&:eE-a08p2 L|z)Od{p*=axgRN^y-[o5$R@>yBœ\|+3{ )m`"ELyo8ِ'?$߶$ϼs:t+tyb8h %YYMgޭu7Zϝe2JWxy [YXM b XExA<&fAay<ˇ[Td(T ( k;~UŭÉWV|z0ZJ5mҕ ;;ha~f"{x2TՇH.+TISwwrTy٣5RrMr0.&7 T΄f(QZ: +zOcar'g*)l?|9k+ԫ3@VD.mA3(%ON!6XEOZĦHGf5/?gT:Q޽9sfg}RRv.n0G-jQFm{30Sj"I?l{70#x'&Vz'LuBs 5-f5l#̹ ;8/E^7 Fb9"{Z(xo4`ɜӞ=W;ׯOڞ[8 Xg=V8hLgfê5"Wq7Ā_ X{K#ԪIAd|cC{1o#o5$Ea8BR[)'fȡ,`.}ams0DEL1`IjN8?{SX _8]I 'W[3pŎG5␺PYj IKg2e@5UY`i[1tL/[ޓJb?ucM"פmweسW7V/߁4Bhw'N5/4ʣ]~4&4Xg,  vh$~,R7 wrY M5H\ Q]cwZ_+LJ7&}ȓ:0u,TW!R܊4*ry%#oQ8D""k:hہJB#01O_gjZX-l#E@Q[cڽ4C܊}AWٕ9UB mI(Ys~|4J@Н KًJO  [Q wAOz^![TjD<auoP"!c$KM[rHYZa!@aͻ g[_B?J\iZ/)AI)c-z4}j+亓m<^S(u&e|Er'_u ;ӯ7ksaןt#+Oތ/8v|̪ 5X3Y<.sZFQd@Q]BA$,PѬ)ؼ(Hղ[,fPBFE쭴&?3f\(F{Vln!E!:O4b+Pr V]e%kXv`zV_faWf;/Ӛc{GK|~Z{v霔ޒuSyX-x8Ζ*p]3.?CE~,?n nx,bЛUe#|; čXikWw>u.W/l"œl|y[-.w=kвi1:`fbexm LIۥZlznzDE]頾H [Kհ򦞗.$$qFBW؃fbFŲZHsC>;9ea7ht¬1쯭`5wMv=jCx;3y2: -Cg8\9CMkvC]`p)29m1>ڝe.laHa{&ߑ& "z4A7.Ni \pkd@%[L #m&WJq[x  lVLƘ)ST"V3unzXdɑ eti#,z8;S0}QhYpþT|DxLuRe?ZW,nd qvLߺPtFg- kMbFbLX(sՁn?^l?\Iq":m3ěLf!n.<sOuER;?pR4X3l0=r,1̄/}=_bngBKNo,&|AF] .@=d^<~ذ5߷)amif݃J&c "02(ո K$kNaxlIFY~`;'4d'dYN"ٖ"D*i,XK~I*J4k+uFw_.s^ڛkK^52%V_0LʫI!N"7/Qx$J$5#5fAekZqoz&dJʀM164}YO@yk' M\kK`S/ݎqeɮ@c+0Mecc~Ʈ@BvuHukt>~Vq&YuWngÁtJ&#sT 5DD}Y頖?v?цn=FsrKruEjǫ6+>|Qx] +5~=Gfש7v86ἣZ>taF;|)v'(mg1iPV`^ A=5DG$u/$;jH5LN]wfmZY(P5sʟii")6HMNY]:?G۶FHB4")A`J\ SN)Sq)[~Zd혅o\x`)V!g[<7HyIsjgɟ>VS)UHF UlαO8U{ojvf)Y5 ʙ$1 d, 1}R]2T\tb԰0{]#ϴ:Nq 3ze[J2"Izy'~R'Ţ1HBb,ݦ t% mgZͳ tCcg-W&?;7uYMj;1vp돌uOFۍa)lx!`@ƣ[o1ӱΉڐ^~G̜97Doؐ-S>q=y1 ěuxz~ؗNy [4-~̝cH}k(ܸ次 4}[=ٞ ݍTo9Ԗر%J΋ [?]"dmB1uw4ul2r'c,Z _N(wUZԜg{ۮA#͵-w$6{춑GFy`mLAʨJŴ&RC~C.|a^:B:w LQ$k9Ц149}=/86Ⱦt9k?/-Z-|vzY:cg-ܣIӒzLb_$$8 ۼaP}Bym8{ _Bݼ6jdaln=`3ti@Q0 H# H( )\yY5+YO顿[.e3ʎD0y2>[r<9BT0M*o 9aL$e#W5CXeɝK I,ƕ> π"~(?X•uڝ4#Ii𴲸>DRA I8;zG=<.aC$sF %}M6|R$^?k010/½%~.mvib vsS䊑&n.׊_{g;X^L)8_` H]=^Kt.fָt^t *Mx"QrF_YEZJIgc,O+k}9IOx?߻Mo 43^?*pU'IgEx_ vHuF]ں!n}iP1@^ I]/i) -[{epPK[x!Q!`E{H\2ibZl jl_EtrEN .y|G4!׍V14:?lL4\{9 HJMc;=HZ^L[<*%xL 0rnFCrAfti5oa}q~KeRƭWtc?QSLC&+*N-]8oĸA$KI*so͢.0SH)p1{.łAz*JLt7}m@LČU L" 7@glͯ-tt(PDQ7\:eP p G]`KCɣDsWͦ D"(=Oz}AGyu#=+-ɻ4ж9w YZ